Sciweavers

97 search results - page 9 / 20
» Resiliency of Network Topologies under Path-Based Attacks
Sort
View
87
Voted
MOBIQUITOUS
2008
IEEE
15 years 4 months ago
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of the...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
IMC
2005
ACM
15 years 3 months ago
Characterizing Unstructured Overlay Topologies in Modern P2P File-Sharing Systems
During recent years, peer-to-peer (P2P) file-sharing systems have evolved in many ways to accommodate growing numbers of participating peers. In particular, new features have cha...
Daniel Stutzbach, Reza Rejaie, Subhabrata Sen
INFOCOM
2005
IEEE
15 years 3 months ago
Topology aware overlay networks
— Recently, overlay networks have emerged as a means to enhance end-to-end application performance and availability. Overlay networks attempt to leverage the inherent redundancy ...
Junghee Han, David Watson, Farnam Jahanian
SERSCISA
2009
Springer
15 years 4 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
SAC
2006
ACM
15 years 3 months ago
Proactive resilience through architectural hybridization
In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusiontolerant system under the asynchronous model. This result f...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...